Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 16:42

General

  • Target

    Data/Modules/porsche1.exe.xml

  • Size

    163B

  • MD5

    9a3d99ab612161dfe2116f5939b8bc05

  • SHA1

    a0f4570011c4e5add32b247889eb1036c9f1cfa1

  • SHA256

    97f54f7cda9454d4083f240408cd315a54c99be0d770f3a77baa18b00a410c8a

  • SHA512

    4701a79ae88d0164c87930d35fc3e2ebab016e6bb7ea794f90b67268782b298ab65288b8364afcaadb5c4ce6b22630179426f5a53da60dde81cb6c90a88d8590

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Data\Modules\porsche1.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66bc8833a05a8fa3d4ef70fefac931f8

    SHA1

    5e4e5c2c27afd12e84aa9eaa46ff9c8640b5dba7

    SHA256

    c229148cb1b29509493ee7d94500548073f1f29de12202269d82abdb78055a03

    SHA512

    8a6f2ccb459ffc040e3deee2a4e97e1751a6a7dec983fbd5fc73bd4512287ab93fa125b6526a0ceb3f57c4eabae5e509274d80616288c2e33079339727712028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eac9114e95175d2edbe73dbe6b660493

    SHA1

    3a9692ee99da47c8623b400eda0178a04e78fbbc

    SHA256

    7e05b216fede429286879c89e000565d650985f4f7ed2a03e869ddfe5a964ddb

    SHA512

    80f4971d1b219778c14690dbbb4e9ac6f603c9e981a1e7cdca4532953ca3bd4591cf7d7f2104a71319b88ef942b9bb5a706a55811a5e6d9dbc5f1f5def33185a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8addc0d6beb04e2343320270d51fa648

    SHA1

    f8323d565931fbbb2115712025e50ed53da44330

    SHA256

    83e84ec29313223ad54630c6b38fbe3855e02c93ce43a91cf9133e27171f0b7e

    SHA512

    fc29214f49a44c088e3238555914c6c693058521b7f327e2ef227b2557fa19b62668b49e4a62dcbd776bc54456760c7eb4661d68873f27fae33745a206b8238d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4052af085d37fa640d4ef375451bc5ca

    SHA1

    0b676ba4d64e03731b6fb8d19b1af8f0661d0119

    SHA256

    876d0d6f3046dd41d8c38522caeb6167aa393f40b7a1642ed9039a7637958740

    SHA512

    407c3dd2bb246289c2b62324dbe3c8a78710eb2f0a04723ba1be8e425dc2352affc3aeb58b8774f7c9c3a962688fccfa9f7a52a5efd34505eab9ee7fbab32775

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d5959160505e3714a81cf729c11ae94

    SHA1

    dc6797a39f2838059ae3fcd9fc741e7aef96898a

    SHA256

    db83ffecf03f9d4841b897e4314dfdde1a1d11106349b573cf2c87ae74f36bd2

    SHA512

    85135051c29baa9d30427b5ef4df981265bec356d4ecbfa602baec8abefaa0f20e5fd397e9cfc3362e159c124023a7f9019f63fc65945fe0712ad0b5da2bf8dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8052478386bfb0170da5b643ba11f92

    SHA1

    53bd3546be1ab07e1e862560fe36bf22442306dd

    SHA256

    b7212d97aa488ec166366f5280d1b3ef6d1b206d8b3b1c277df54393c94e2320

    SHA512

    0c53ee680583768fb2ffe16f9b7843e2198d0cdacf6b39260f70b24ad78c437b3119aea7ef4a37ba2c47575d12566da4b2649994e8fe47286752e5610b49a6c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e17c02ebe9cfcce0c6b064ec5cb1fde

    SHA1

    9303dcbe61050d0d21894e10038514d92d5ffbbb

    SHA256

    3c1b9a6ef7a90da3ee0778f10fbc96bda5e7cbb0109f567abcb49698f23df7f5

    SHA512

    5683b57fc1f5f1c281d89b773b9eab98cc833d7c23d2063f75f6812e7dfe1798c4d6111cd68a15e2787ae58e30c8da6390be9e9a9bef5dab6bbe2649a6578c5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    445cfa65e82778dbdd8154e9de4b022e

    SHA1

    04190d9083e079b80838ec512c0cba6dfac3be93

    SHA256

    16587655b1984abc24480efe5632431c3df9abb7ee147d6d0f8e482e9cae84a9

    SHA512

    a2e0a403d78204af37dff90b010008f984f485460c04db7d1d05bacc78c0f2a9be3b37cd715aa725006c9c1f543012f1a0f1c8e4ab0f26c4955403ab86da8ef9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d16931af4d936c2ebc207b470e45279e

    SHA1

    aab8b2693710c333a5f7d2eeefe5cf3f919c6758

    SHA256

    43de63c5e2180b019a25f28f8b255f33574c7e7ed357742e07e0ea632194d8f0

    SHA512

    5101d174f333124902e26278c0b17ccf991448bf3172caa9e7a6fcacac30d15148d2823d5c03612062a2cf8aa13442bc94e6587dfa337c34a89c8ab1ee3c22ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25e31d804c7b25320e54990dcd8db3ce

    SHA1

    7dcc486667cf41b61813715fa55de2aeb11100ad

    SHA256

    31c7b0f842e7f40b3b21d9542a6ac63561fd429cd0e79d16ea7e47d25228034f

    SHA512

    98f8cfb99512992a53b705b752751c160f5d52a43924c7bdc01d3cd7afd9d5efb65a0298e613f5783882561d3de745d40367a7b276d284131e59020f17d6e26b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ae6487d10ba657102bc4e2cded1a5a5

    SHA1

    93574728ef0ace862d17f8967531fc6235db3d14

    SHA256

    f1079b5e039511688cb22fd547259e1271ac26e318341c8dfb6ab65bce9a0cf6

    SHA512

    518e31e43f7a9c1cac635353a67867c7a0640355665bbbd489cd00494076251b1224a4890dfbb54e77bdca34cfd78c85b412ab760995cd181a19c50661c70431

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f96cb304aade455f1babe5423e88e7a

    SHA1

    8095b1bd08153976aeea3a561db08b026d8b79b3

    SHA256

    d87d2a7be9c3df780fcdd1bed3193558d60bbf12b314e3c4faf150f3dbc02326

    SHA512

    86a8648a1de94b9a6b20a826b5edae7826c464a455ff15b848bfd9e93279303253d7ccfc7596e2ecc1197fbeecaa0cb770ae641d4451f628ae3aa19f38b2d529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6ef1a90aba12586d770faed4011b834

    SHA1

    6d9c9f5caac11513f3124756852cd837c2236d16

    SHA256

    3fb62230a04338b372d95e5f89d270f616646ff776263e6428e6b7a5e8de1921

    SHA512

    a821f385ecde41a38f613d77c3dc55c06f1aa85b1b33c71b7482c4c9cb5cff0f2ac28e82e8a68f34ec4458e4ba59f06dec5f3a011bb9300f085ad610f329d79c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c29bd2c782850a916dbdeb6962277f18

    SHA1

    7aaa4e1ac510b3a653beabef3101065c32b905b0

    SHA256

    d7799c536efd971148a0e005f69788f12a5722c9cdb5407315a0546283abe8a6

    SHA512

    13d00fc441dffdbab3e1da2017286e9e90897c77f9851f07c2477d8548cb0662e9264693212cd9335e44e45ef41b72deddaa2fe0ee00aed912e920fbf44743d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    327c1ac6381ea8951aeedf6196587d0c

    SHA1

    76464a670ec9245d4f85676e6d8394fa70c5b48f

    SHA256

    1e5282d26c5483ba021ea2ab85dad5a84575192eb9c6d6748bba1d1085436d55

    SHA512

    1a4d0215600e8baa58e56b5caec246a2084c39c29406d4b0c8b12c304c85e30537fb076aa5a6c36e38ef63212db8d834b396f69701c8b1b7c7375e2b7f5974b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6fb763e0fa3704a766e837821f8a45c

    SHA1

    3590ad73205222002612e333e04bccdf2c63274d

    SHA256

    d2b53be10e8776703ba5119a129a1d2c6515bd51d8162b1b0751ab7a2a745383

    SHA512

    1c20faec699116cdbebf4c67c990a7c932582eeb62f4841bd01ddc1de36d9b5bb8f82bec6322aeec63e8589fc1c1d098af66a4f8c1b8a6ab900768d2a6d66e86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9e3835ef7a363f25ba389cdf715b9a0

    SHA1

    0b5a4cfad5236ea52ceb7e88759abed445456790

    SHA256

    8482a94f31b69de3fd7adff36e1849fb02a17afd1472356b6466cf215e181c30

    SHA512

    462cb415fe77345afdcd93b8535259746a7d9f671815241b4b9bb8dce8f4336dc213985122857c19b78fbf22d08a6fb41a0853b52ef83d6ae3fdc931b7b41efc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5de2b0b38d256968a742b72d390688c

    SHA1

    e7edcd09f952093ce7d726dc8c71b8a8f4b06a6c

    SHA256

    db7a14d0846ab4ae77a0951ad8c805eba348d255c689797c8d1e7c2fc82898d1

    SHA512

    9cab6c95c2b8bd18754df979f821f90fcdd2d1e8836f78d0e5339f1fb0f964a9937dcef5f5d82e60d1a4f6ee34980920f71c136cc016fac473d6326d3086965c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d407fded622ee62f00f3e2d9689e4b38

    SHA1

    4c4eaf4b3409d6a00ad3cbc7991b20749ec77985

    SHA256

    eaacddaa71b06c872149cd334b3a22c8a80d50d538e6714b8a6e43a42de1c8ba

    SHA512

    e54a58c6c6ef7f8d6541ad4c923002564923d126af75ad1b8972967a1be148f01e85055b9c11cb44ee85f3cca6753ee46ace10c918502c3d60a1e7a4406f4e73

  • C:\Users\Admin\AppData\Local\Temp\CabF089.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF0FA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b